COUNTERING IMPROVISED EXPLOSIVE DEVICES
|
|
- Homer Holmes
- 5 years ago
- Views:
Transcription
1 COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 26 FEB REPORT TYPE 3. DATES COVERED to TITLE AND SUBTITLE Countering Improvised Explosive Devices 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) The White House,1600 Pennsylvania Ave NW,Washington,DC, PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 6 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 THE WHITE HOUSE WASHINGTON February 26, 2013 We have no greater responsibility than providing for the safety and security for our citizens, allies, and partners, while providing an economic environment that promotes opportunity and prosperity. The use of improvised explosive devices (IEDs) threatens these interests by killing, injuring, and intimidating citizens and political leaders around the world, inflicting damage on U.S. forces on the battlefield, and disrupting transportation and the flow of commerce. The terrorists and criminals responsible for these attacks are resilient, technologically adept, and adaptable. They employ the most recent and successful tactics, techniques, and procedures gained from experience in Iraq, Afghanistan, and around the world. The use of IEDs worldwide has increased in recent years, with the number of attacks exceeding 4,000 in Today marks the 20th anniversary of the first World Trade Center attack. We have come a long way since that time. Our capabilities to counter IEDs have evolved and grown. In issuing this policy statement, I recognize the important achievements to date and establish our priorities for the future in countering the threat. We must not become complacent, but must continue to challenge ourselves and each other to be more effective against these threats as we work together to reach our shared national interests of safety, security, and prosperity.
4 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons available to terrorists and criminals to damage critical infrastructure and inflict casualties, as was demonstrated in the attempted bombing of Northwest Flight 253 on December 25, 2009, the October 2010 air cargo plot, and the wars in Iraq and Afghanistan. The tactics used in IED attacks continue to evolve as our adversaries seek to overcome countermeasures. This Administration is expanding and broadening its counter-ied focus, building upon existing policy and strategy, which establish and implement measures to discover, prevent, protect against, respond to, recover from, and mitigate IED attacks and their consequences at home or abroad. We will enhance our effectiveness by: Leveraging, Integrating, and Aligning United States Government Efforts. The United States Government uses its military, law enforcement, diplomatic, regulatory, intelligence, and financial tools to counter IEDs globally. By actively and responsibly coordinating efforts across departments and agencies, we can increase our effectiveness against IED threats while making the best use of existing capabilities and resources. Enhancing Our Focus on Protecting American Lives. IED attacks threaten American lives at home and abroad. Overseas, we are working with partner nations to reduce the IED threat to members of our military and diplomatic services, as well as U.S. citizens engaged in commercial travel and trade. To better meet the IED threat at home, we will seek to incorporate lessons learned abroad, while respecting legal and policy factors relevant to domestic counter-ied operations. Promoting Cooperation with Governmental, International, and Private Sector Partners. Sharing meaningful information about the IED threat with partners that are familiar with their communities increases the chance that suspicious activity will be recognized and reported to law enforcement authorities. The United States will work with partners to reduce the IED threat by sharing intelligence, building capacity, and developing complementary activities. Translating Policy into Actions To realize these policy objectives, we will employ the following priority capabilities and enabling technologies, which leverage existing investments, including: 1. Increasing Domestic and International Engagement. We will seek to: Improve public awareness of IED threats and corresponding reporting of suspicious activity to local authorities through enhanced information sharing resources; Enhance information sharing with public and private sector partners on current IED threats and preparedness measures; and
5 Countering Improvised Explosive Devices Increase global participation and partnership in dialogues on counter-ied efforts and information sharing. 2. Effectively Exploiting Information and Materials from IED Attacks. We will enhance our capability to identify IED networks, tactics, techniques and procedures through: Coordinating our IED collection and exploitation efforts, to better gather, share, and analyze forensic, technical, and biometric information; and Enhancing policy, process, and mechanisms to analyze more effectively and share IED exploitation results. 3. Advancing Our Intelligence and Information Analysis. We will improve our understanding of technologies, trends, and networks through: Enhancing the reporting on and dissemination of criminal intelligence, incident information, and suspicious activity involving explosives; Making counter-ied-specific intelligence resources more accessible to those who need it; Conducting multi-mode data analysis of IED patterns, trends, and tactics, techniques, and procedures to anticipate future IED threat evolutions; and Advancing the analytic tools available to better link information across sources, including financial information, biometrics, movements of people and technology, and other intelligence, in a secure manner. 4. Maintaining Our Deployable Counter-IED Resources. We will maintain our scalable and layered counter-ied capabilities, including personnel and equipment through: Developing and maintaining deployable United States Government counter-ied resources; Assisting international partners with the development of deployable counter-ied capabilities; and Conducting exercises with deployable counter-ied resources. 5. Screening, Detecting, and Protecting Our People, Facilities, Transportation Systems, Critical Infrastructure, as well as the Flow of Legitimate Commerce. We will continue to develop and use advanced protection and detection technologies and capabilities by: Improving the performance of explosives screening, detection, and protection technologies through prioritizing and coordinating research within the United States and with our allies; and Effectively deploying and integrating these technologies and capabilities into our critical infrastructure and transportation systems to decrease the risk of an IED attack while facilitating legitimate trade and travel. 6. Safeguarding Explosives and Select Precursor Materials. We will enhance our ability to identify, prevent, and interdict the illicit diversion or transport of select materials used to manufacture IEDs through: 2
6 Countering Improvised Explosive Devices Promoting mechanisms for industry to better detect, report, and prevent the illegitimate acquisition, theft, or diversion of explosives and related materials; Enhancing enforcement of U.S. laws regulating commerce in explosives and materials that could be used as IED components; Increasing global awareness of actions to mitigate the use of munitions, precursor chemicals, and other components in IED construction; Evaluating methods to further restrict, control, or monitor select dual-use precursors and components; and Coordinating domestic and international efforts to investigate, disrupt, dismantle and arrest members of networks involved in the financing and illicit movement of IED components. 7. Coordinating and Standardizing Training and Equipment. Based on an updated assessment of our national counter-ied training and equipment needs and priorities, we will improve coordination to deliver standardized training to our domestic and international partners through: Incorporating the lessons learned globally, including those from Iraq and Afghanistan, into our training and equipment requirements; Resourcing and implementing the Federal electronic countermeasures program to achieve a national capability; Enhancing national guidelines for bomb technicians; Finalizing and implementing national guidelines for explosives detection canine teams; and Leveraging existing technology transfer programs to address counter-ied capability gaps at the Federal, state, and local levels. 8. Enhancing Our Operational Planning. We will develop interagency operational plans to advance the Nation's ability to counter the use of IEDs, and establish measures to assess overall effectiveness and progress. This will include: Developing and exercising a Federal counter-ied operational plan for a domestic or transnational threat; Enhancing counter-ied preparedness planning for Federal, state, and local response; and Evaluating and reporting annually on interagency progress toward the goals set. The Joint Program Office for Countering IEDs, administered by the Attorney General through the Federal Bureau of Investigation (FBI), is an interagency group that will coordinate and track progress across the departments and agencies toward building these capabilities. The Joint Program Office will also provide metrics and assist departments and agencies in coordinating their priorities. 3
7 Countering Improvised Explosive Devices Examples of Success Departments and agencies are already at work implementing these policy objectives. Examples include: Increased International Engagement. The Departments of State and Homeland Security have, working through the World Customs Organization, engaged global partners in an effort to track and limit the flow of IED precursor materials into Afghanistan. Our allies and partner nations have had similar success in stopping IED plots and limiting the flow of explosives precursors by raising awareness among the public and across industries. The United States is also raising awareness of the global IED threat within the Group of 8, and other multilateral fora. Exploiting IED Information and Materials. The Departments of Defense and Justice adapted law enforcement investigative and forensic expertise to fit the needs of warfighters. We are now able to use the materials generated through the exploitation of thousands of IEDs to enhance counter-ied technologies and inform best practices and training. Safeguarding Explosive Materials. The Departments of State, the Treasury, Defense, Justice, and Homeland Security, and the Intelligence Community are working together, with the assistance of international partners and multilateral organizations, to stem the flow of explosives precursors to Afghanistan and disrupt the illicit finance networks that support the production and use of IEDs. Domestically, we continue to seek to prevent terrorists from acquiring and converting these materials into IEDs, while maintaining access for legitimate use. For example, a recent attempt to make explosives in West Texas was stopped by the FBI when a chemical company reported suspicious purchases. Screen, Detect, and Protect. The Department of Homeland Security uses intelligence gathered by other departments and agencies to best position screening measures that keep explosives out of transportation systems. Coordinating and Standardizing Training. By using the intelligence and exploitation information generated from IEDs found overseas, the FBI and the Department of Homeland Security have updated and enhanced the training and information provided to public safety bomb technicians, law enforcement, and first responders on how to respond to the latest terrorist IED tactics. Conclusion The threat from IED use is likely to remain high in the coming decade and will continue to evolve in response to our abilities to counter them. A whole-of-government approach that integrates Federal, state, local, tribal, territorial, private sector, and global participation in counter-ied activities will best position the United States to discover plots to use IEDs in the United States, or against U.S. persons abroad, before those threats become imminent. 4
COUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationService Level Agreements: An Approach to Software Lifecycle Management. CDR Leonard Gaines Naval Supply Systems Command 29 January 2003
Service Level Agreements: An Approach to Software Lifecycle Management CDR Leonard Gaines Naval Supply Systems Command 29 January 2003 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
More informationDirected Energy Using High-Power Microwave Technology
Directed Energy High-Power Microwave Directed Energy Using High-Power By Jacob Walker and Matthew McQuage 78 The Directed Energy Warfare Office (DEWO) and Directed Energy Division at the Naval Surface
More information4. Lessons Learned in Introducing MBSE: 2009 to 2012
4. Lessons Learned in Introducing MBSE: 2009 to 2012 Abstract A. Peter Campbell University of South Australia An overview of the lessons that are emerging from recent efforts to employ MBSE in the development
More informationCorrosion Prevention and Control Database. Bob Barbin 07 February 2011 ASETSDefense 2011
Corrosion Prevention and Control Database Bob Barbin 07 February 2011 ASETSDefense 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationA Review of the 2007 Air Force Inaugural Sustainability Report
Headquarters U.S. Air Force A Review of the 2007 Air Force Inaugural Sustainability Report Lt Col Wade Weisman SAF/IEE 703-693-9544 wade.weisman@pentagon.af.mil Ms. Krista Goodale Booz Allen Hamilton 757-466-3251
More informationComponents and Considerations in Building an Insider Threat Program
Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management
More informationArchitecting for Resiliency Army s Common Operating Environment (COE) SERC
Architecting for Resiliency Army s Common Operating Environment (COE) SERC 5 October 2011 Mr. Terry Edwards Director, ASA(ALT) Office of the Chief Systems Engineer (OCSE) (703) 614-4540 terry.edwards@us.army.mil
More information2013 US State of Cybercrime Survey
2013 US State of Cybercrime Survey Unknown How 24 % Bad is the Insider Threat? Insiders 51% 2007-2013 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
More informationPreventing Insider Sabotage: Lessons Learned From Actual Attacks
Preventing Insider Sabotage: Lessons Learned From Actual Attacks Dawn Cappelli November 14, 2005 2005 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationTechnological Advances In Emergency Management
Technological Advances In Emergency Management Closing the gap between Preparation and Recovery Will Fontan, P.E. Regional Director, ONRG Americas Office Report Documentation Page Form Approved OMB No.
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationEnergy Security: A Global Challenge
A presentation from the 2009 Topical Symposium: Energy Security: A Global Challenge Hosted by: The Institute for National Strategic Studies of The National Defense University 29-30 September 2009 By SCOTT
More informationOffice of Global Maritime Situational Awareness
Global Maritime Awareness Office of Global Maritime Situational Awareness Capt. George E McCarthy, USN October 27 th 2009 Office of Global Maritime Situational Awareness A National Coordination Office
More informationU.S. Army Research, Development and Engineering Command (IDAS) Briefer: Jason Morse ARMED Team Leader Ground System Survivability, TARDEC
U.S. Army Research, Development and Engineering Command Integrated Defensive Aid Suites (IDAS) Briefer: Jason Morse ARMED Team Leader Ground System Survivability, TARDEC Report Documentation Page Form
More informationConcept of Operations Discussion Summary
TSPG Common Dataset Standard Concept of Operations Discussion Summary Tony DalSasso 677 AESG/EN 15 May 2007 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
More informationInformation, Decision, & Complex Networks AFOSR/RTC Overview
Information, Decision, & Complex Networks AFOSR/RTC Overview 06 MAR 2013 Integrity Service Excellence Robert J. Bonneau, Ph.D. Division Chief AFOSR/RTC Air Force Research Laboratory Report Documentation
More informationUS Army Industry Day Conference Boeing SBIR/STTR Program Overview
US Army Industry Day Conference Boeing SBIR/STTR Program Overview Larry Pionke, DSc Associate Technical Fellow Product Standards - Technology & Services Boeing Research & Technology Ft. Leonard Wood (FLW)
More informationMulti-Modal Communication
Multi-Modal Communication 14 November 2011 Victor S. Finomore, Jr., Ph.D. Research Psychologist Battlespace Acoustic Branch Air Force Research Laboratory DISTRIBUTION STATEMENT D. Distribution authorized
More informationDoD Common Access Card Information Brief. Smart Card Project Managers Group
DoD Common Access Card Information Brief Smart Card Project Managers Group 12 July, 2001 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burder for this collection of information
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationATCCIS Replication Mechanism (ARM)
ATCCIS Replication Mechanism (ARM) Fundamental Concepts Presented by Peter Angel, P.Eng. Advanced Systems Management Group 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationData to Decisions Terminate, Tolerate, Transfer, or Treat
I N S T I T U T E F O R D E F E N S E A N A L Y S E S Data to Decisions Terminate, Tolerate, Transfer, or Treat Laura A. Odell 25 July 2016 Approved for public release; distribution is unlimited. IDA Non-Standard
More informationA Distributed Parallel Processing System for Command and Control Imagery
A Distributed Parallel Processing System for Command and Control Imagery Dr. Scott E. Spetka[1][2], Dr. George O. Ramseyer[3], Dennis Fitzgerald[1] and Dr. Richard E. Linderman[3] [1] ITT Industries Advanced
More informationCurrent Threat Environment
Current Threat Environment Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT mssherman@sei.cmu.edu 29-Aug-2014 Report Documentation Page Form
More informationCyber Threat Prioritization
Cyber Threat Prioritization FSSCC Threat and Vulnerability Assessment Committee Jay McAllister Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 THE WHITE HOUSE WASHINGTON January 23, 2012 The United States and nations around the world depend upon the efficient and secure transit
More informationDana Sinno MIT Lincoln Laboratory 244 Wood Street Lexington, MA phone:
Self-Organizing Networks (SONets) with Application to Target Tracking Dana Sinno 244 Wood Street Lexington, MA 02420-9108 phone: 781-981-4526 email: @ll.mit.edu Abstract The growing interest in large arrays
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary For Immediate Release September 23, 2014 EXECUTIVE ORDER - - - - - - - CLIMATE-RESILIENT INTERNATIONAL DEVELOPMENT By the authority vested in me as President
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationKathleen Fisher Program Manager, Information Innovation Office
Kathleen Fisher Program Manager, Information Innovation Office High Assurance Systems DARPA Cyber Colloquium Arlington, VA November 7, 2011 Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationFUDSChem. Brian Jordan With the assistance of Deb Walker. Formerly Used Defense Site Chemistry Database. USACE-Albuquerque District.
FUDSChem Formerly Used Defense Site Chemistry Database Brian Jordan With the assistance of Deb Walker USACE-Albuquerque District 31 March 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188
More informationCenter for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS
Center for Infrastructure Assurance and Security (CIAS) Joe Sanchez AIA Liaison to CIAS 1 REPORT DOCUMENTATION PAGE Form Approved OMB No. 074-0188 Public reporting burden for this collection of information
More informationEmpirically Based Analysis: The DDoS Case
Empirically Based Analysis: The DDoS Case Jul 22 nd, 2004 CERT Analysis Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213-3890 The CERT Analysis Center is part of the
More informationUsing Templates to Support Crisis Action Mission Planning
Using Templates to Support Crisis Action Mission Planning Alice Mulvehill 10 Moulton Rd Cambridge, MA 02138 USA 617-873-2228 Fax: 617-873-4328 amm@bbn.com Michael Callaghan 695 Wanaao Rd Kailua, HI 96734
More informationOpen briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons
[Draft concept note] Open briefing of the Counter-Terrorism Committee on Preventing Terrorists from Acquiring Weapons United Nations Headquarters, New York, Wednesday, 17 May 2017 I. Introduction 1. Security
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationCoalition Interoperability Ontology:
Coalition Interoperability Ontology: Sharing Situational Awareness with Allies and Agents Erik Chaum Naval Undersea Warfare Center, Division Newport, TTCP, Maritime Systems Group, TP1 US National Leader
More informationInter-American Port Security Cooperation Plan
Inter-American Port Security Cooperation Plan Thomas Morelli Program Manager for Port & Cargo Security Maritime Administration U.S. Department of Transportation Inter-American Port Security Cooperation
More informationTHE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER
FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationARINC653 AADL Annex Update
ARINC653 AADL Annex Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Julien Delange AADL Meeting February 15 Report Documentation Page Form Approved OMB No. 0704-0188
More informationCOMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II)
AL/EQ-TR-1997-3104 COMPUTATIONAL FLUID DYNAMICS (CFD) ANALYSIS AND DEVELOPMENT OF HALON- REPLACEMENT FIRE EXTINGUISHING SYSTEMS (PHASE II) D. Nickolaus CFD Research Corporation 215 Wynn Drive Huntsville,
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationREPORT DOCUMENTATION PAGE
REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationUsing Model-Theoretic Invariants for Semantic Integration. Michael Gruninger NIST / Institute for Systems Research University of Maryland
Using Model-Theoretic Invariants for Semantic Integration Michael Gruninger NIST / Institute for Systems Research University of Maryland Report Documentation Page Form Approved OMB No. 0704-0188 Public
More informationHomeland Security Institute. Annual Report. pursuant to. Homeland Security Act of 2002
Homeland Security Institute Annual Report pursuant to Homeland Security Act of 2002 July 1, 2005 Homeland Security Institute ANNUAL REPORT Introduction Established in April 2004, the Homeland Security
More informationVision Protection Army Technology Objective (ATO) Overview for GVSET VIP Day. Sensors from Laser Weapons Date: 17 Jul 09 UNCLASSIFIED
Vision Protection Army Technology Objective (ATO) Overview for GVSET VIP Day DISTRIBUTION STATEMENT A. Approved for public release. Vision POC: Rob Protection Goedert, ATO: TARDEC Protection ATO manager
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More information75th Air Base Wing. Effective Data Stewarding Measures in Support of EESOH-MIS
75th Air Base Wing Effective Data Stewarding Measures in Support of EESOH-MIS Steve Rasmussen Hill Air Force Base (AFB) Air Quality Program Manager 75 CEG/CEVC (801) 777-0359 Steve.Rasmussen@hill.af.mil
More informationPresidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationChemical, Biological, Radiological & Nuclear Defense Information Analysis Center CBRNIAC
Chemical, Biological, Radiological & Nuclear Defense Information Analysis Center Approved for Public Release U.S. Government Work (17 USC 105) Not copyrighted in the U.S. CBRNIAC Ron Evans Director evansrl@battelle.org
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationDefense Hotline Allegations Concerning Contractor-Invoiced Travel for U.S. Army Corps of Engineers' Contracts W912DY-10-D-0014 and W912DY-10-D-0024
Report No. DODIG-2013-056 March 15, 2013 Defense Hotline Allegations Concerning Contractor-Invoiced Travel for U.S. Army Corps of Engineers' Contracts W912DY-10-D-0014 and W912DY-10-D-0024 Report Documentation
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationMitigation Framework Leadership Group (MitFLG) Charter DRAFT
Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationSecure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool
in the NATO Time Sensitive Targeting Tool Dr Orhan Cetinkaya, Dr Yakup Yildirim and Mr Michel Fortier NATO C3 Agency Oude Waalsdorperweg 61, 2597 AK The Hague NETHERLANDS {orhan.cetinkaya, yakup.yildirim,
More informationSetting the Standard for Real-Time Digital Signal Processing Pentek Seminar Series. Digital IF Standardization
Setting the Standard for Real-Time Digital Signal Processing Pentek Seminar Series Digital IF Standardization Report Documentation Page Form Approved OMB No 0704-0188 Public reporting burden for the collection
More informationJune 5, 2018 Independence, Ohio
June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga
More informationDr. Stuart Dickinson Dr. Donald H. Steinbrecher Naval Undersea Warfare Center, Newport, RI May 10, 2011
Environment, Energy Security & Sustainability Symposium & Exhibition Dr. Stuart Dickinson Dr. Donald H. Steinbrecher Naval Undersea Warfare Center, Newport, RI Stuart.dickinson@navy.mil May 10, 2011 Approved
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More information2011 NNI Environment, Health, and Safety Research Strategy
2011 NNI Environment, Health, and Safety Research Strategy Sally S. Tinkle, Ph.D. Deputy Director National Nanotechnology Coordination Office Coordinator for NNI EHS stinkle@nnco.nano.gov 1 Report Documentation
More informationSpace and Missile Systems Center
Space and Missile Systems Center M-Code Benefits and Availability Capt Travis Mills, SMC/GPEP 29 Apr 15 UNCLASSIFIED/APPROVED FOR PUBLIC RELEASE Report Documentation Page Form Approved OMB No. 0704-0188
More informationCENTER FOR ADVANCED ENERGY SYSTEM Rutgers University. Field Management for Industrial Assessment Centers Appointed By USDOE
Field Management for Industrial Assessment Centers Appointed By USDOE Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to
More informationDomestic Nuclear Detection Office (DNDO) DNDO Overview
Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationRunning CyberCIEGE on Linux without Windows
Running CyberCIEGE on Linux without Windows May, 0 Report Documentation Page Form Approved OMB No. 070-0 Public reporting burden for the collection of information is estimated to average hour per response,
More informationUse of the Polarized Radiance Distribution Camera System in the RADYO Program
Use of the Polarized Radiance Distribution Camera System in the RADYO Program Kenneth J. Voss Physics Department, University of Miami Coral Gables, Fl. 33124 phone: (305) 284-2323 ext 2 fax: (305) 284-4222
More informationFBI Role in Overseas Investigations
DONALD VAN DUYN CHIEF INTELLIGENCE OFFICER FEDERAL BUREAU OF INVESTIGATION BEFORE THE SENATE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JANUARY 8, 2009 Good afternoon Chairman Lieberman, Senator
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationHigh-Assurance Security/Safety on HPEC Systems: an Oxymoron?
High-Assurance Security/Safety on HPEC Systems: an Oxymoron? Bill Beckwith Objective Interface Systems, Inc. Phone: 703-295-6519 Email Address: bill.beckwith@ois.com W. Mark Vanfleet National Security
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationM&S Strategic Initiatives to Support Test & Evaluation
DMSC 2008 March 11, 2008 M&S Strategic Initiatives to Support Test & Evaluation Mr. Richard Lockhart Principal Deputy Director Test Resource Management Center (TRMC) OUSD(AT&L) March 11, 2008 Report Documentation
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationSection One of the Order: The Cybersecurity of Federal Networks.
Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Working Together How Federal Agencies Coordinate Security Across All Disciplines: The
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationOffice of Infrastructure Protection Overview
Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient
More informationIntroducing I 3 CON. The Information Interpretation and Integration Conference
Introducing I 3 CON The Information Interpretation and Integration Conference Todd Hughes, Ph.D. Senior Member, Engineering Staff Advanced Technology Laboratories 10/7/2004 LOCKHEED MARTIN 1 Report Documentation
More informationBy Derrick H. Karimi Member of the Technical Staff Emerging Technology Center. Open Architectures in the Defense Intelligence Community
Open Architectures in the Defense Intelligence Community By Derrick H. Karimi Member of the Technical Staff Emerging Technology Center This blog post is co-authored by Eric Werner. In an era of sequestration
More informationNATO-IST-124 Experimentation Instructions
ARL-TN-0799 NOV 2016 US Army Research Laboratory NATO-IST-124 Experimentation Instructions by Kelvin M Marcus NOTICES Disclaimers The findings in this report are not to be construed as an official Department
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationGAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
More information73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 712CD For office use only 41205 21-23 June 2005, at US Military Academy, West Point, NY Please complete this form 712CD as your cover page to
More informationTopology Control from Bottom to Top
Topology Control from Bottom to Top M. Steenstrup Stow Research L.L.C. Clemson University steenie@rcn.com This work was funded in part by DARPA and by ONR MURI. Report Documentation Page Form Approved
More informationEmergency Management Response and Recovery. Mark Merritt, President September 2011
Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks
More informationMarch 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience
This document is scheduled to be published in the Federal Register on 03/25/2016 and available online at http://federalregister.gov/a/2016-06901, and on FDsys.gov March 21, 2016 MEMORANDUM FOR THE HEADS
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More information